home *** CD-ROM | disk | FTP | other *** search
- =========================================================================
- Date: Thu, 1 Sep 1994 00:07:00 CDT
- Reply-To: TK0JUT2@MVS.CSO.NIU.EDU
- Sender: CU-DIGEST list <CUDIGEST%UIUCVMD.bitnet@vm42.cso.uiuc.edu>
- From: "Cu Digest (tk0jut2@mvs.cso.niu.edu)"
- <TK0JUT2%NIU.bitnet@vm42.cso.uiuc.edu>
- Subject: Cu Digest, #6.78
-
- CONTENTS, #6.78 (Wed, Aug 31, 1994)
- File 4--"Top Secret Data Encryption Techniques" by Held
- ------------------------------
- Date: Tue, 30 Aug 1994 11:52:53 -0600 (MDT)
- From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
- Subject: File 4--"Top Secret Data Encryption Techniques" by Held
-
- BKTSDET.RVW 940712
-
- SAMS Publishing
- 11711 N. College Ave., Suite 140
- Carmel, IN 46032-5634
- 317-573-2500
- 317-581-3535
- 800-428-5331
- 800-428-3804
- hayden@hayden.com
- haydenbks@aol.com
- 76350.3014@compuserve.com
- "Top Secret Data Encryption Techniques", Held, 1993, 0-672-30293-4,
- U$24.95/C$31.95
-
- This book is a lot of fun, and may even be of some use. A number of
- ciphering techniques are outlined, and the interested hobbyist can
- undoubtedly come up with many variations on the themes. The included
- source code, in BASIC, is simple and straightforward, and can easily
- be modified to suit new ideas.
-
- Fun, and possibly useful, but definitely *not* top secret. Of the
- five chapters that actually deal with encipherment, three deal
- strictly with mono-alphabetic substitution. Regardless of how complex
- the substitution, a one-to-one correspondence is susceptible to either
- character frequency analysis or brute force cracking. The remaining
- two chapters deal with poly-alphabetic substitutions that are still,
- because of the fact of substitution, subject to brute force attacks.
- (The one exception is the generation of a "one time" pad.)
-
- Advanced encryption is currently the province of higher mathematics.
- Explanations and sample code for these would require more
- sophistication than the current book demands. Still, it would not
- have been impossible to include them, and it might have improved the
- scope of the book.
-
- Simple, and subject to attack, or not, the techniques in the book can
- be used for some measure of privacy and security. As stated in the
- preface, even crackable codes may raise the expense of getting at the
- data beyond its worth.
-